Unlock instant, AI-driven research and patent intelligence for your innovation.

Password re-usage identification based on input method editor analysis

a technology of input method and user identity, applied in the field of user identity identification based on input method editor analysis, can solve the problems of putting sensitive business data at risk, and the cost of cybercrime to the global economy is hundreds of billions of dollars a year

Active Publication Date: 2018-05-29
CROWDSTRIKE
View PDF24 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent is about a way to identify if someone has used a new password based on the way they type on a computer. The system analyzes the way they type and compares it to existing password data to see if there is a match. If there is, the system will let the user know that their new password has been used before. This helps to improve security and prevent the same passwords from being used multiple times.

Problems solved by technology

Annual cyber crime cost to the global economy is hundreds of billions of dollars, including both the gains to criminals and the costs to companies for recovery and defense.
Users, such as employees, are often resistant to remember multiple passwords, and such resistance might cause these users to use their passwords, such as their corporate login passwords, on other sites, placing sensitive business data at risk.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password re-usage identification based on input method editor analysis
  • Password re-usage identification based on input method editor analysis
  • Password re-usage identification based on input method editor analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013]FIGS. 1-5 show an approach for password revalidation on a kernel level based on an input method editor analytics. The approach includes predefined password policy and rules, an input password analytics daemon, an input phrase hash table (hashed so that outsiders cannot view table of passwords), and a password revalidation agent. The input password analytics daemon detects possible password phrases and hashes them as input phrases to a hash table with related stamps (e.g., application identifier, updated dates, etc.). The password revalidation agent checks for new password input phrases in input method editor. If the agent detects that any input pair of phrases sequences are the same as a hashed possible password phrases, then a re-usage identification alert is triggered. Note that no one will know what the suspected password is / was because the approach advises the user that the password is a repeat without revealing the password that was entered by the user.

[0014]The present i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An approach is provided for password re-usage identification based on an Input Method Editor (IME) analysis. The approach analyzes a number of keystrokes received from a user at the IME that is running on the information handling system. A set of keystrokes received at the IME are identified as a possible new password that is being established by the user. A set of existing password data is searched with the search being based on the possible new password. The set of existing passwords are stored in a data store accessible from at least one of the processors of the information handling system. In response to the searching identifying that one of the existing passwords matches the possible new password, a notification, or warning, is displayed to the user.

Description

BACKGROUND OF THE INVENTION[0001]Technical Field[0002]This disclosure relates to alerting users to re-usage of a common password for multiple systems.[0003]Description of Related Art[0004]Annual cyber crime cost to the global economy is hundreds of billions of dollars, including both the gains to criminals and the costs to companies for recovery and defense. Popular social networks, web mail and online banking are frequently targeted by cyber-criminals. Login credentials and sensitive information is harvested through malware, phishing or server-side attacks. Users, such as employees, are often resistant to remember multiple passwords, and such resistance might cause these users to use their passwords, such as their corporate login passwords, on other sites, placing sensitive business data at risk. Organizations must ensure that employees and other users of enterprise applications do not reuse their credentials for non-enterprise apps. One of the most prevalent security rules is to r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): G06F21/46H04L9/32G06F3/023
CPCG06F21/46G06F3/0237H04L9/3234H04L9/3236H04L9/3226G06F2221/2131
Inventor CHILDRESS, RHONDA L.GOLDBERG, ITZHACKKUMHYR, DAVID B.LIU, SUSONDHI, NEIL
Owner CROWDSTRIKE